You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/attack-path-reference.md
+17-5Lines changed: 17 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,23 +1,25 @@
1
1
---
2
-
title: Reference list of attack paths
2
+
title: Reference list of attack paths and cloud security graph components
3
3
titleSuffix: Defender for Cloud
4
4
description: This article lists Microsoft Defender for Cloud's list of attack paths based on resource.
5
5
ms.topic: reference
6
6
ms.custom: ignite-2022
7
-
ms.date: 09/21/2022
7
+
ms.date: 11/08/2022
8
8
---
9
9
10
10
11
-
# Reference list of attack paths
11
+
# Reference list of attack paths and cloud security graph components
12
12
13
-
This article lists the attack paths, connections and insights you might see in Microsoft Defender for Cloud. What you are shown in your environment depends on the resources you're protecting and your customized configuration.
13
+
This article lists the attack paths, connections and insights you might see in Microsoft Defender for Cloud related to Defender for Cloud Security Posture Management (CSPM). What you are shown in your environment depends on the resources you're protecting and your customized configuration. You will need to [enable Defender for CSPM](enable-enhanced-security.md#enable-defender-plans-to-get-the-enhanced-security-features) to view your attack paths. Learn more about [the cloud security graph, attack path analysis, and the cloud security explorer?](concept-attack-path.md).
14
14
15
15
To learn about how to respond to these attack paths, see [Identify and remediate attack paths](how-to-manage-attack-path.md).
| Attack Path Display Name | Attack Path Description |
22
24
|--|--|
23
25
| Internet exposed VM has high severity vulnerabilities | Virtual machine '\[MachineName]' is reachable from the internet and has high severity vulnerabilities \[RCE]|
@@ -32,6 +34,8 @@ To learn about how to respond to these attack paths, see [Identify and remediate
| Attack Path Display Name | Attack Path Description |
36
40
|--|--|
37
41
| Internet exposed EC2 instance has high severity vulnerabilities and high permission to an account | AWS EC2 instance '\[EC2Name]' is reachable from the internet, has high severity vulnerabilities\[RCE] and has '\[permission]' permission to account '\[AccountName]' |
@@ -43,6 +47,8 @@ To learn about how to respond to these attack paths, see [Identify and remediate
43
47
44
48
### Azure data
45
49
50
+
Prerequisite: [Enable Microsoft Defender for SQL servers on machines](defender-for-sql-usage.md).
51
+
46
52
| Attack Path Display Name | Attack Path Description |
47
53
|--|--|
48
54
| Internet exposed SQL on VM has a user account with commonly used username and allows code execution on the VM | SQL on VM '\[SqlVirtualMachineName]' is reachable from the internet, has a local user account with commonly used username (which is prone to brute force attacks), and has vulnerabilities allowing code execution and lateral movement to the underlying VM |
@@ -52,18 +58,24 @@ To learn about how to respond to these attack paths, see [Identify and remediate
52
58
53
59
### AWS Data
54
60
61
+
Prerequisite: [Enable Microsoft Defender for SQL servers on machines](defender-for-sql-usage.md).
62
+
55
63
| Attack Path Display Name | Attack Path Description |
56
64
|--|--|
57
65
| Internet exposed AWS S3 Bucket with sensitive data is publicly accessible | S3 bucket '\[BucketName]' with sensitive data is reachable from the internet and allows public read access without authorization required. For more details, you can learn how to [prioritize security actions by data sensitivity](./information-protection.md). |
58
66
59
67
### Azure containers
60
68
69
+
Prerequisite: [Enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers. This will also give you the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in security explorer.
70
+
61
71
| Attack Path Display Name | Attack Path Description |
62
72
|--|--|--|
63
73
| Internet exposed Kubernetes pod is running a container with RCE vulnerabilities | Internet exposed Kubernetes pod '\[pod name]' in namespace '\[namespace]' is running a container '\[container name]' using image '\[image name]' which has vulnerabilities allowing remote code execution |
64
74
| Kubernetes pod running on an internet exposed node uses host network is running a container with RCE vulnerabilities | Kubernetes pod '\[pod name]' in namespace '\[namespace]' with host network access enabled is exposed to the internet via the host network. The pod is running container '\[container name]' using image '\[image name]' which has vulnerabilities allowing remote code execution |
65
75
66
-
## Insights and connections
76
+
## Cloud security graph components list
77
+
78
+
This section lists all of the cloud security graph components (connections & insights) that can be used in queries with the [cloud security explorer](concept-attack-path.md).
One of the biggest challenges that security teams face today is the number of security issues they face on a daily basis. There are numerous security issues that need to be resolve and never enough resources to address them all.
13
15
14
-
Defender for Cloud's contextual security capabilities assists security teams to assess the risk behind each security issue, and identify the highest risk issues that need to be resolved soonest. Defender for Cloud assists security teams to reduce the risk of an impactful breach to their environment in the most effective way.
16
+
Defender for Cloud's contextual security capabilities assists security teams to assess the risk behind each security issue, and identify the highest risk issues that need to be resolved soonest. Defender for Cloud assists security teams to reduce the risk of an impactful breach to their environment in the most effective way.
17
+
18
+
All of these capabilities are available as part of the [Defender Cloud Security Posture Management](concept-cloud-security-posture-management.md) plan and the requiring the enablement of [agentless scanning for VMs](concept-agentless-data-collection.md)
15
19
16
20
## What is cloud security graph?
17
21
@@ -37,8 +41,11 @@ Using the cloud security explorer, you can proactively identify security risks i
37
41
38
42
Cloud security explorer provides you with the ability to perform proactive exploration features. You can search for security risks within your organization by running graph-based path-finding queries on top the contextual security data that is already provided by Defender for Cloud. Such as, cloud misconfigurations, vulnerabilities, resource context, lateral movement possibilities between resources and more.
39
43
40
-
Learn how to use the [cloud security explorer](how-to-manage-cloud-security-explorer.md), or check out the list of [insights and connections](attack-path-reference.md#insights-and-connections).
44
+
Learn how to use the [cloud security explorer](how-to-manage-cloud-security-explorer.md), or check out the [cloud security graph components list](attack-path-reference.md#cloud-security-graph-components-list).
41
45
42
46
## Next steps
43
47
44
-
[Identify and remediate attack paths](how-to-manage-attack-path.md)
48
+
-[Enable Defender CSPM on a subscription](enable-enhanced-security.md#enable-enhanced-security-features-on-a-subscription)
49
+
-[Identify and remediate attack paths](how-to-manage-attack-path.md)
50
+
-[Enabling agentless scanning for machines](enable-vulnerability-assessment-agentless.md#enabling-agentless-scanning-for-machines)
51
+
-[Build a query with the cloud security explorer](how-to-manage-cloud-security-explorer.md)
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/enable-vulnerability-assessment-agentless.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ When you enable agentless vulnerability assessment:
33
33
34
34
## Enabling agentless scanning for machines
35
35
36
-
When you enable Defender [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) or [Defender for Servers P2](defender-for-servers-introduction.md), agentless scanning is enabled on by default.
36
+
When you enable [Defender Cloud Security Posture Management (CSPM)](concept-cloud-security-posture-management.md) or [Defender for Servers P2](defender-for-servers-introduction.md), agentless scanning is enabled on by default.
37
37
38
38
If you have Defender for Servers P2 already enabled and agentless scanning is turned off, you need to turn on agentless scanning manually.
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/how-to-manage-attack-path.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Defender for Cloud
4
4
description: Learn how to manage your attack path analysis and build queries to locate vulnerabilities in your multicloud environment.
5
5
ms.topic: how-to
6
6
ms.custom: ignite-2022
7
-
ms.date: 10/03/2022
7
+
ms.date: 11/08/2022
8
8
---
9
9
10
10
# Identify and remediate attack paths
@@ -20,6 +20,7 @@ You can check out the full list of [Attack path names and descriptions](attack-p
20
20
| Aspect | Details |
21
21
|--|--|
22
22
| Release state | Preview |
23
+
| Prerequisite | - [Enable agentless scanning](enable-vulnerability-assessment-agentless.md) <br> - [Enable Defender for CSPM](enable-enhanced-security.md) <br> - [Enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers. This will also give you the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in security explorer. |
Copy file name to clipboardExpand all lines: articles/defender-for-cloud/how-to-manage-cloud-security-explorer.md
+8-3Lines changed: 8 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ titleSuffix: Defender for Cloud
4
4
description: Learn how to build queries in cloud security explorer to find vulnerabilities that exist on your multicloud environment.
5
5
ms.topic: how-to
6
6
ms.custom: ignite-2022
7
-
ms.date: 10/03/2022
7
+
ms.date: 11/08/2022
8
8
---
9
9
10
10
# Cloud security explorer
@@ -13,13 +13,16 @@ Defender for Cloud's contextual security capabilities assists security teams in
13
13
14
14
By using the cloud security explorer, you can proactively identify security risks in your cloud environment by running graph-based queries on the cloud security graph, which is Defender for Cloud's context engine. You can prioritize your security team's concerns, while taking your organization's specific context and conventions into account.
15
15
16
-
With the cloud security explorer, you can query all of your security issues and environment context such as assets inventory, exposure to internet, permissions, lateral movement between resources and more.
16
+
With the cloud security explorer, you can query all of your security issues and environment context such as assets inventory, exposure to internet, permissions, lateral movement between resources and more.
17
+
18
+
Learn more about [the cloud security graph, attack path analysis, and the cloud security explorer?](concept-attack-path.md).
17
19
18
20
## Availability
19
21
20
22
| Aspect | Details |
21
23
|--|--|
22
24
| Release state | Preview |
25
+
| Prerequisite | - [Enable agentless scanning](enable-vulnerability-assessment-agentless.md) <br> - [Enable Defender for CSPM](enable-enhanced-security.md) <br> - [Enable Defender for Containers](defender-for-containers-enable.md), and install the relevant agents in order to view attack paths that are related to containers. This will also give you the ability to [query](how-to-manage-cloud-security-explorer.md#build-a-query-with-the-cloud-security-explorer) containers data plane workloads in security explorer. |
0 commit comments